Award Totals

Award List

Cybernet Systems Corporation will provide a system of hardware and software that will provide advanced data mining capability to the DHS analyst. This system is an add-on to existing DHS, not a repla ...

Robotic sample acquisition is essentially grasping. Multi-finger robot sample grasping devices are controlled to securely pick up samples. Equations have been developed to provide optimal grasps for ...

OneSAF is rapidly becoming a centerpiece for many training simulations in the Army, amongst other reasons, for its ability to interoperate with many different protocols and packages. It only makes se ...

SBIRPhase I2010Office of the Secretary of DefenseDepartment of Defense

An important consideration of long duration space flight operations is interpersonal dynamics that effect crew cohesion and performance. Flight surgeons have stated the need for unobtrusive monitoring ...

The prevailing approach to non-destructive evaluation (NDE) of aircraft components is to set an inspection schedule based on what is generally known about the component in question. Engineers perform ...

NASA has expressed the need to assess crew autonomy relative to performance and evaluate an optimal level of autonomy that maximizes individual and team performance. For this project, we propose to le ...

Develop Small Satellite Analysis Laboratory (SatLab): A simulation-of-simulations framework to integrate component and engineering simulations into a single larger simulation capable of full satellite ...

We propose the creation and deployment of an automated machine vision based sensor, tracking, and identification system for monitoring wildlife in support of managing natural resources. However, far ...

The High Assurance Platform Workstation (HAPWS) offers affordable and easy-to-manage multi-level and cross-domain capabilities to end-users in a desktop or console form-factor. It allows the end-user ...

Large scale adoption of homogeneous computing environments presents serious risk of automated attacks due to the unified nature of the computing environments. Botnet and computer virus attacks are suc ...